Assurance system and assurance method

a technology of assurance system and assurance method, applied in the field of assurance system, can solve the problems of imposing the authentication server itself, unable to use a desired resource, and unable to operate user authentication and grant access rights

Inactive Publication Date: 2005-03-10
CANON KK
View PDF4 Cites 46 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0020] The present invention has been proposed to solve the conventional problems, and has as its objects to provide an assurance system and assurance method which assure, in a client PC or device, the reliability of a multiplexed authentication server.

Problems solved by technology

However, if a failure occurs in only authentication server in the domain, the functions such as user authentication and grant of an access right cannot operate at all.
In this state, the user can obtain neither authentication nor a use right from the authentication server and therefore cannot use a desired resource such as a device or file server even when it normally runs.
However, if the plurality of authentication servers are simultaneously running, a problem arises as described above.
On the other hand, a new problem arises from the viewpoint of reliability of the security function for which the authentication server has responsibility.
That is, imposing of the authentication server itself may occur.
In this case, the mechanism which assures the reliability of the authentication servers to be activated for backup is imperfect.
Alternatively, a password may be stolen from authentication procedures for a regular user.
That is, various kinds of problems in security arise.
Such a rogue server which causes many problems in security must be inhibited from taking part in the domain as a backup authentication server.
However, it is difficult for a client PC or device on the domain to determine whether the second-priority authentication server, i.e., backup authentication server is reliable.
This can be regarded as a security hole in the authentication server multiplexed system because it permits imposing of the multiplexed authentication servers in the domain.
Additionally, the conventional administrator password authentication method cannot completely prevent imposing of authentication servers.
That is, the system user is caused to set the false address.
Once the user sets the address of the imposing authentication server in the client PC or device, various kinds of problems in security, as described above, arise when the first-priority authentication server goes down due to a failure.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Assurance system and assurance method
  • Assurance system and assurance method
  • Assurance system and assurance method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The embodiments of the assurance system according to the present invention will be described below with reference to the accompanying drawings.

[0041]FIG. 1 is a view showing the overall arrangement of a system which assures reliability in an authentication server multiplexed system according to the present invention.

[0042] As shown in FIG. 1, the assurance system according to this embodiment includes client PCs 1-1 and 1-3 which provide services for users, a network device 1-5, and an authentication server 11-7 which collectively executes identification and authentication of users and access control. These components are connected by a physical network connection means so that information communication between them is possible.

[0043] In the assurance system according to this embodiment, the network device 1-5 is a printing device connected to the network or a multifunctional device having scanner, printer, and FAX functions. A file server (not shown) or the like may also b...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

In a client PC or device, the reliability of multiplexed authentication servers is assured. In an assurance system including a client PC (1-1, 1-3), an authentication server 1 (1-7), and a device (1-5) connected to a network, a multiplexed system is built by arranging an authentication server 2 (1-8) in order to back up the authentication server 1 (1-7), public key cryptography is used for encrypted communication between the client PC, the authentication servers 1 and 2, and the device, and the public keys of the authentication servers 1 and 2 are electronically signed by using the private key of one system administrator (1-10) by public key cryptography.

Description

FIELD OF THE INVENTION [0001] The present invention relates to an assurance system including a plurality of client server PCs, devices, and an authentication server which authenticates users who will use the client server PCs and devices and controls access to resources and, more particularly, a duplexed system (redundant system) which backs up the function of an authentication server when failures occur in it and, more particularly, a system which imparts reliability to a plurality of authentication servers including the redundant system and confirms the reliability. BACKGROUND OF THE INVENTION [0002] If a user wants to use a resource of some kind on a logic domain including client PCs, servers, and devices connected to a network, authentication of the user and grant of a resource access right are necessary. An authentication server in the client server system makes use of its function to authenticate the user and grant an access right on the basis of a unique or standardized proto...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(United States)
IPC IPC(8): G06F21/00G06F21/45H04L9/08H04L9/30H04L9/32H04L29/06
CPCH04L63/0442H04L63/0823H04L9/3247H04L9/083H04L63/126
Inventor SHIGEEDA, NOBUYUKI
Owner CANON KK
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products